Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Hot Vendors

Deep-Security-Professional Trend Micro Certified Professional for Deep Security Exam Questions and Answers

Questions 4

Based on the configuration setting highlighted in the exhibit, what behavior can be expected during a malware scan?

Deep-Security-Professional Question 4

Options:

A.

With the highlighted setting enabled, Deep Security Agents will scan files for known viruses and malware using patterns and any files deemed suspicious will be submitted to a configured Deep Discovery Analyzer for further analysis.

B.

With the highlighted setting enabled, Deep Security Agents will scan files for viruses and malware using supplementary aggressive detection pattern files.

C.

With the highlighted setting enabled, Deep Security Agents will scan files for unknown malware using Predictive Machine Learning.

D.

With the highlighted setting enabled, Deep Security Agents will scan files for known malware as well as newly encounted malware by accessing the Suspicious Objects List.

Buy Now
Questions 5

Which Protection Modules can make use of a locally installed Smart Protection Server?

Options:

A.

The Anti-Malware and Web Reputation Protection Modules can make use of the locally installed Smart Protection Server.

B.

All Protection Modules can make use of the locally installed Smart Protection Server

C.

Anti-Malware is the only Protection Modules that can use the locally installed Smart Protection Server.

D.

The Anti-Malware, Web Reputation and Intrusion Prevention Protection Modules can make use of the locally installed Smart Protection Server.

Buy Now
Questions 6

What is IntelliScan?

Options:

A.

IntelliScan is a method of identifying which files are subject to malware scanning as determined from the file content. It uses the file header to verify the true file type.

B.

IntelliScan is a mechanism that improves scanning performance. It recognizes files that have already been scanned based on a digital fingerprint of the file.

C.

IntelliScan reduces the risk of viruses entering your network by blocking real-time compressed executable files and pairs them with other characteristics to improve mal-ware catch rates.

D.

IntelliScan is a malware scanning method that monitors process memory in real time. It can identify known malicious processes and terminate them.

Buy Now
Questions 7

Which of the following statements is true regarding the use of the Firewall Protection Module in Deep Security?

Options:

A.

The Firewall Protection Module can check files for certain characteristics such as compression and known exploit code.

B.

The Firewall Protection Module can identify suspicious byte sequences in packets.

C.

The Firewall Protection Module can detect and block Cross Site Scripting and SQL In-jection attacks.

D.

The Firewall Protection Module can prevent DoS attacks coming from multiple systems.

Buy Now
Questions 8

Which of the following statements is true regarding Deep Security Relays?

Options:

A.

Both 32-bit and 64-bit Deep Security Agents can be promoted to a Deep Security Relay.

B.

Deep Security Agents promoted to Deep Security Relays no longer provide the security capabilities enabled by the Protection Modules.

C.

Deep Security Relays are able to process Deep Security Agent requests during updates.

D.

Deep Security Agents communicate with Deep Security Relays to obtain security up-dates.

Buy Now
Questions 9

An administrator attempts to activate the Deep Security Agent installed on a server by typing the following command in the Command Prompt on the Deep Security Agent computer:

dsa_control -a dsm://server1.acme.com:4120

The Agent does not activate as expected. What is a valid reason for this issue?

Options:

A.

The incorrect port was used. The correct command would be: dsa_control -a dsm://server1.acme.com:4118

B.

Deep Security Agents can not be activated through the Command Prompt. They must be activated through the Deep Security Manager Web console or through a deployment script.

C.

The command listed can only executed from the Command Prompt on the Deep Security Manager computer.

D.

"Allow Agent-Initiated Activation" is currently not enabled in Deep Security Manager.

Buy Now
Questions 10

Based on the following exhibit, what behavior would you expect for the Application Control Protection Module?

Deep-Security-Professional Question 10

Options:

A.

Since this computer is in Maintenance Mode, updates to the Application Control Pro-tection Module will be applied.

B.

Since this computer is in Maintenance Mode, new or changed software will be auto-matically added to the list of Allowed software in the currently active ruleset.

C.

Since this computer is in Maintenance Mode, Application Control will allow any Blocked software to temporarily run

D.

Since this computer is in Maintenance Mode, Application Control will ignore any Blocked software in the currently active ruleset.

Buy Now
Questions 11

The Intrusion Prevention Protection Module is enabled, but the traffic it is trying to analyze is encrypted through https. How is it possible for the Intrusion Prevention Protection Module to monitor this encrypted traffic against the assigned rules?

Options:

A.

It is possible to monitor the https traffic by creating an SSL Configuration. Creating a new SSL Configuration will make the key information needed to decrypt the traffic available to the Deep Security Agent.

B.

The Intrusion Prevention Protection Module is not able to analyze encrypted https traffic.

C.

The Intrusion Prevention Protection Module can only analyze https traffic originating from other servers hosting a Deep Security Agent.

D.

The Intrusion Prevention Protection Module can analyze https traffic if the public cer-tificate of the originating server is imported into the certificate store on the Deep Secu-rity Agent computer.

Buy Now
Questions 12

How can you prevent a file from being scanned for malware?

Options:

A.

Enable "File Types scanned by IntelliScan" in the Malware Scan Configuration prop-erties in the Deep Security Manager Web console. Click "Scan All Except" and type the filename to exclude from the scan.

B.

Edit the "Scan Exclusions" section of the dsa.properties configuration file on the Deep Security Agent computer to include the file name. Save the configuration file and restart the Deep Security Agent service.

C.

Add the file to the Exclusions list in the Malware Scan Configuration.

D.

Add the file to the Exclusions list in the "Allowed Spyware/Grayware Configuration".

Buy Now
Exam Name: Trend Micro Certified Professional for Deep Security Exam
Last Update: Nov 20, 2024
Questions: 80

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now Deep-Security-Professional testing engine

PDF (Q&A)

$35  $99.99
buy now Deep-Security-Professional pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2024